New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem

被引:0
|
作者
Houzhen Wang [1 ,2 ]
Huanguo Zhang [1 ]
Shaowu Mao [1 ]
Wanqing Wu [1 ]
Liqiang Zhang [1 ]
机构
[1] Computer School of Wuhan University
基金
中国国家自然科学基金;
关键词
public key cryptosystem; key exchange; Multivariate Public Key Cryptography(MPKC); Morphism of Polynomials(MP) problem;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography(MPKC), which is considered to be an important candidate for post-quantum cryptography. However,it is universally regarded as a difficult task, as in the Knapsack cryptosystems, to design a secure MPKC scheme(especially an encryption scheme) employing the existing trapdoor construction. In this paper, we propose a new key-exchange scheme and an MPKC scheme based on the Morphism of Polynomials(MP) problem. The security of the proposed schemes is provably reducible to the conjectured intractability of a new difficult problem,namely the Decisional Multivariate Diffie-Hellman(DMDH) problem derived from the MP problem. The proposed key agreement is one of several non-number-theory-based protocols, and is a candidate for use in the post-quantum era. More importantly, by slightly modifying the protocol, we offer an original approach to designing a secure MPKC scheme. Furthermore, the proposed encryption scheme achieves a good tradeoff between security and efficiency,and seems competitive with traditional MPKC schemes.
引用
收藏
页码:302 / 311
页数:10
相关论文
共 50 条
  • [1] New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
    Wang, Houzhen
    Zhang, Huanguo
    Mao, Shaowu
    Wu, Wanqing
    Zhang, Liqiang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (03) : 302 - 311
  • [2] A New Knapsack Public-Key Cryptosystem
    Zhang, Weidong
    Wang, Baocang
    Hu, Yupu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 53 - 56
  • [3] New public-key cryptosystem using braid groups
    Ko, KH
    Lee, SJ
    Cheon, JH
    Han, JW
    Kang, JS
    Park, C
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 166 - 183
  • [4] Public-key Cryptosystem Based on Permutation Rational Function
    Wei, Pengcheng
    Wei, Ran
    Zhu, Yingxian
    Yang, Xinbo
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 452 - 454
  • [5] New Signcryption Scheme based on Multivariate Public-key Cryptosystem
    Han Yiliang
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2015, 8 : 227 - 230
  • [6] Analysis and implementation of public-key cryptosystem based on the Boolean satisfiability problem
    Singh, S
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 704 - 709
  • [7] PCLA: A New Public-key Cryptosystem Based on Logarithmic Approach
    Raghuvamshi, Archana
    Rao, P. Venkateswara
    2012 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION: INNOVATIVE PRACTICES AND FUTURE TRENDS (AICERA), 2012,
  • [8] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 219 - 233
  • [9] Equivalent key attack against a public-key cryptosystem based on subset sum problem
    Liu, Jiayang
    Bi, Jingguo
    IET INFORMATION SECURITY, 2018, 12 (06) : 498 - 501
  • [10] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 17 - 31